Upgrade to remove ads Show
Only ₩37,125/year
Terms in this set (22)A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer? subnotebook What type of management system below can help distribute and manage public and corporate apps? Wireless Device Management Mobile Device Management Total Device Management Extended Device Management Mobile Device Management How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?" Mobile Application Management Extended Application Management Remote Application Management Cloud Application Management Mobile Application Management Which of the following selections is not one of the features provided by a typical MDM? Rapidly deploy new mobile devices Discover devices accessing enterprise systems Track stolen devices Enforce encryption settings Track stolen devices A QR code can't contain which of the following items directly? A URL. A phone number. An e-mail address. A video. a video what is designed for user convenience, have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device? tablet computing device that uses a limited version of an operating system and uses a web browser with an integrated media player. web-based How is the coverage area for a cellular telephony network usually divided in a typical city? Hexagon shaped cells. Square square shaped cells. Triangle shaped cells. Circular shaped cells. hexagon shaped cells located in a satellite and regenerates a signal that is sent back to earth at another frequency repeater Select the proprietary wireless network technology that is used primarily by sensors for communicating data. ANT Bluetooth SCD USB ANT Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices? BYOD COPE VDI CYOD COPE (Corporate owned, personally enabled) Which enterprise deployment model allows users to use their personal mobile devices for business purposes? BYOD COPE VDI CYOD BYOD Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise? management flexibility increased internal service increased employee performance less oversight increased internal service what adds geographical identification data to media such as digital photos taken on a mobile device? GPS tagging What connection
technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access? COPE OTA VDI OTG Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs? selected context authentication context-aware authentication user designated authentication trigger locking context-aware authentication Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network, and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS) tunnel? P2413 Standard European Union Telecomm Law and Regulations Security 2 (S2) framework Industrial Internet Security Framework (IISF) Security 2 (S2) framework What type of software is specifically designed for a SoC in an embedded system? SCADA RTOS What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention? SCADA HVAC ICS RTOS ICS Which of the following can replace using radio frequency (RF) for the communication media? ANT Bluetooth repeaters infrared infrared Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees? extended management content management remote management application management content managment What type of update service can Apple users take advantage of to update their operating systems via wireless carriers? OTG COPE OTA VDI OTA Sets with similar termsITS - Final - 3/425 terms oremacc Intro to Network Security sixth ed chapter 1060 terms david_ellis43 9, 10, 11, 12 CIT 270 System Security Review136 terms abby_king89 CIS ch 1063 terms Kevin_Kolb3 Sets found in the same folderChapter 9 Quiz40 terms Casey_Scott305 Chapter 10 Quiz24 terms asuone39 Network Security Ch 6 Part 240 terms sony_ann CH1340 terms siggyfresh Other sets by this creatorQuantitative Reasoning2 terms lizgyuris Exam 219 terms lizgyuris Exam 23 terms lizgyuris Marketing Research exam 1141 terms lizgyuris Other Quizlet setsTest #2: Chapter 621 terms elizabeth_holcomb1 Rad-Bio CH 1-220 terms karliewyman Evercore Oil68 terms SethObadia Pain IV NSAIDS & Acetaminophen14 terms mollyk0005 Related questionsQUESTION Your location can be captured from your mobile device even if app location tracking is turned off. (T or F) 6 answers QUESTION Microsoft also supports remote management via PowerShell. This technique is often called Windows Remote Management. It requires a Service ("WinRM") to be running on the client. (1) 2 answers QUESTION Which layer is used for reliable communication between end nodes over the network and provides mechanisms for establishing, maintaining, and terminating virtual circuits as well as controlling the flow of information? 15 answers QUESTION Which type of website file contains software that's executed by the browser on the user's computer? 15 answers Which enterprise deployment model allows users to use their personal mobile devices for business?BYOD (bring your own device) is undoubtedly the most well-known policy on this list, and the most popular deployment model for businesses. Under a BYOD policy, employees bring their personal devices to the office and use them for work-related tasks.
In which of the following mobile device deployment models are employees supplied a chosen device paid for by their company for both professional and personal use?-In corporate-owned personally enabled (COPE) models, employees are supplied a chosen device paid for by their company for both professional and personal use.
Which access control model that uses access based on a user's job function within an organization?Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise. RBAC ensures employees access only information they need to do their jobs and prevents them from accessing information that doesn't pertain to them.
What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?The principle of least privilege (PoLP) refers to an information security concept in which a user is given the minimum levels of access – or permissions – needed to perform his/her job functions.
|